RHEL 5 : kvm (RHSA-2010:0271)

high Nessus Plugin ID 63924

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2010:0271 advisory.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel.

A flaw was found in the way QEMU-KVM handled erroneous data provided by the Linux virtio-net driver, used by guest operating systems. Due to a deficiency in the TSO (TCP segment offloading) implementation, a guest's virtio-net driver would transmit improper data to a certain QEMU-KVM process on the host, causing the guest to crash. A remote attacker could use this flaw to send specially-crafted data to a target guest system, causing that guest to crash. (CVE-2010-0741)

Additionally, these updated packages include numerous bug fixes and enhancements. Refer to the KVM chapter of the Red Hat Enterprise Linux 5.5 Technical Notes for details:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kvm.html

All KVM users should upgrade to these updated packages, which resolve this issue as well as fixing the bugs and adding the enhancements noted in the Technical Notes. Note: The procedure in the Solution section must be performed before this update will take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?6d93441e

http://www.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=508040

https://bugzilla.redhat.com/show_bug.cgi?id=510706

https://bugzilla.redhat.com/show_bug.cgi?id=511072

https://bugzilla.redhat.com/show_bug.cgi?id=512672

https://bugzilla.redhat.com/show_bug.cgi?id=515549

https://bugzilla.redhat.com/show_bug.cgi?id=515655

https://bugzilla.redhat.com/show_bug.cgi?id=515749

https://bugzilla.redhat.com/show_bug.cgi?id=516545

https://bugzilla.redhat.com/show_bug.cgi?id=516672

https://bugzilla.redhat.com/show_bug.cgi?id=516762

https://bugzilla.redhat.com/show_bug.cgi?id=517223

https://bugzilla.redhat.com/show_bug.cgi?id=518090

https://bugzilla.redhat.com/show_bug.cgi?id=518169

https://bugzilla.redhat.com/show_bug.cgi?id=519397

https://bugzilla.redhat.com/show_bug.cgi?id=520285

https://bugzilla.redhat.com/show_bug.cgi?id=521025

https://bugzilla.redhat.com/show_bug.cgi?id=521749

https://bugzilla.redhat.com/show_bug.cgi?id=521835

https://bugzilla.redhat.com/show_bug.cgi?id=522887

https://bugzilla.redhat.com/show_bug.cgi?id=524970

https://bugzilla.redhat.com/show_bug.cgi?id=525323

https://bugzilla.redhat.com/show_bug.cgi?id=525699

https://bugzilla.redhat.com/show_bug.cgi?id=526124

https://bugzilla.redhat.com/show_bug.cgi?id=526837

https://bugzilla.redhat.com/show_bug.cgi?id=527722

https://bugzilla.redhat.com/show_bug.cgi?id=528310

https://bugzilla.redhat.com/show_bug.cgi?id=529694

https://bugzilla.redhat.com/show_bug.cgi?id=530134

https://bugzilla.redhat.com/show_bug.cgi?id=530533

https://bugzilla.redhat.com/show_bug.cgi?id=531631

https://bugzilla.redhat.com/show_bug.cgi?id=531701

https://bugzilla.redhat.com/show_bug.cgi?id=531827

https://bugzilla.redhat.com/show_bug.cgi?id=532086

https://bugzilla.redhat.com/show_bug.cgi?id=533059

https://bugzilla.redhat.com/show_bug.cgi?id=533197

https://bugzilla.redhat.com/show_bug.cgi?id=533390

https://bugzilla.redhat.com/show_bug.cgi?id=533453

https://bugzilla.redhat.com/show_bug.cgi?id=537075

https://bugzilla.redhat.com/show_bug.cgi?id=537077

https://bugzilla.redhat.com/show_bug.cgi?id=537646

https://bugzilla.redhat.com/show_bug.cgi?id=537655

https://bugzilla.redhat.com/show_bug.cgi?id=537888

https://bugzilla.redhat.com/show_bug.cgi?id=539250

https://bugzilla.redhat.com/show_bug.cgi?id=539589

https://bugzilla.redhat.com/show_bug.cgi?id=540893

https://bugzilla.redhat.com/show_bug.cgi?id=541084

https://bugzilla.redhat.com/show_bug.cgi?id=541731

https://bugzilla.redhat.com/show_bug.cgi?id=542923

https://bugzilla.redhat.com/show_bug.cgi?id=543137

https://bugzilla.redhat.com/show_bug.cgi?id=543979

https://bugzilla.redhat.com/show_bug.cgi?id=545136

https://bugzilla.redhat.com/show_bug.cgi?id=545194

https://bugzilla.redhat.com/show_bug.cgi?id=546019

https://bugzilla.redhat.com/show_bug.cgi?id=546039

https://bugzilla.redhat.com/show_bug.cgi?id=549938

https://bugzilla.redhat.com/show_bug.cgi?id=550053

https://bugzilla.redhat.com/show_bug.cgi?id=550265

https://bugzilla.redhat.com/show_bug.cgi?id=550755

https://bugzilla.redhat.com/show_bug.cgi?id=552487

https://bugzilla.redhat.com/show_bug.cgi?id=553187

https://bugzilla.redhat.com/show_bug.cgi?id=555780

https://bugzilla.redhat.com/show_bug.cgi?id=557327

https://bugzilla.redhat.com/show_bug.cgi?id=558195

https://bugzilla.redhat.com/show_bug.cgi?id=559163

https://bugzilla.redhat.com/show_bug.cgi?id=559509

https://bugzilla.redhat.com/show_bug.cgi?id=563141

https://bugzilla.redhat.com/show_bug.cgi?id=569762

https://bugzilla.redhat.com/show_bug.cgi?id=577218

https://access.redhat.com/errata/RHSA-2010:0271

Plugin Details

Severity: High

ID: 63924

File Name: redhat-RHSA-2010-0271.nasl

Version: 1.19

Type: local

Agent: unix

Published: 1/24/2013

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.4

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2010-0430

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2010-0741

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kvm-tools, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:kvm, p-cpe:/a:redhat:enterprise_linux:kmod-kvm, p-cpe:/a:redhat:enterprise_linux:kvm-qemu-img

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/30/2010

Vulnerability Publication Date: 4/12/2010

Reference Information

CVE: CVE-2010-0430, CVE-2010-0741

BID: 64576

CWE: 119

RHSA: 2010:0271